Cloud Computing: Security Issues & Solution

Size: px
Start display at page:

Download "Cloud Computing: Security Issues & Solution"

Transcription

1 International Journal of Computational Intelligence Research ISSN Volume 13, Number 6 (2017), pp Research India Publications Cloud Computing: Security Issues & Solution Shweta Singh 1 M. Tech Scholar, Department of CSE, Jamia Hamdrad University, Delhi, India. Tabrez Nafis 2 Assistant Professor, Department of CSE, Jamia Hamdrad University, Delhi, India. Ankita Sethi 3 Assistant Professor, Department of CSE, IPEM group of institutions, India. Abstract It is the technology for providing the computing services such as servers, storage, database, networking etc over the internet on pay per use pattern. It is more popular in today s era as it helps in cost reduction associated with computing. Although it is one of the most prominent technology for such kind of services, the limitation of the technology is the Data Security and Integrity in the environment. The major reason for not opting the cloud environment is the threat in the user s mind about their data security and integrity. Therefore to ensure the security, we are proposing the algorithm for improving the security. It is the hybrid approach of RSA (Rivest, Shamir, Adleman) and SHA 1 (Secure Hash Algorithm) Keywords: Cloud computing, SHA1, RSA, Hashing, Encryption, Decryption, Data Security

2 1420 Shweta Singh, Tabrez Nafis and Ankita Sethi I. INTRODUCTION What is Cloud Computing? It is the process of using remote servers hosted on the internet to store manage & process data instead of using local server or personal computer on pay per use pattern. The major reason for the usage of cloud in today era is the ease which provides to access those services. That is the client needs to pay the amount of its usage. It is the type of internet based computing where the services are delivered to organization devices via internet. There are three components of cloud computing is client computers, distributed server and data center. Storage in the cloud refers to the storage of data online in the cloud where the company s data is stored & can be accessed from different distributed resources which forms a cloud. It is not necessary to install software locally on the computer therefore it provides platform independence. With the help of this concept the business applications become mobile and collaborative[10]. The three cloud layers are: Infrastructure cloud: Abstracts applications from servers and servers from storage Content cloud: Abstracts data from applications Information cloud: Abstracts access from clients to data Figure 1: Cloud Computing Figure 1 describes the characteristics of cloud computing. Cloud computing provides infrastructure, data and software as a service. II. DATA SECURITY ISSUES IN THE CLOUD People are using cloud for their business and they are using the cloud for data storage purpose, hence it is used as base for the companies[9].but the major obstacle for the

3 Cloud Computing: Security Issues & Solution 1421 adoption of cloud as the storage medium is the threat in the user s mind with respect to the security of their valuable data in the cloud. Some of the security issues[4] in the context of cloud computing are[14]- 1) Data Integrity 2) Privacy & confidentiality 3) Data availability 4) Data location & Relocation 1) Data Integrity: Data integrity is the basic component of information security. It refers to the assurance of consistency, correctness and trustworthiness of data. Integrity means that the data is free from tempering and alteration. Cloud service processing uses some efficient and effective mechanism to ensure the integrity in the cloud environment. 2) Privacy & confidentiality: Its refers to the property that the data is made unavailable unauthorized user. In simple words, it refers to the mechanism where the data is accessible to the user who is authorized to the access the sensitive data where others, including cloud computing processing should not take any information out of it. It also protects the data from accidental losses of data. 3) Data availability: It refers to a process in which data is made available wherever it is expected to be used by end user & the application. It ensures the occurrence and availability of the data in normal as well as in the disaster recovery operations. The availability of cloud technologies can be increased by making internet access available but the user is dependent on the resources available in the limited time frame. 4) Data location & Relocation: In the cloud computing the data is mobile which means data location is not known to the customers & user. Mostly it does not matter for the user. For example the photographs in the cloud can be anywhere in the world and it does not matter for the user.but in case of sensitive and confidential information user want to know the location of it. Sometimes user wants to specify a preferred location. To fulfill this purpose a contract is made between the Cloud computing processing and user regarding the space in the particular location or to reside on a known server. The contract should agree prior to the implementation of data but the issue is that the user is unaware of it. Another issue is the movement of data from one location to another. Initially data is stored in any location in the cloud but it is moved to other location because of various reasons.

4 1422 Shweta Singh, Tabrez Nafis and Ankita Sethi III. RELATED WORK In this section, we will summarize the work which has already done in the cloud computing data security. Data security in cloud computing is very crucial as well as essential task as there is a threat to the security of confidential data. Since data is stored in cloud s space which is hosted by third party instead of storing the same in client computer. Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale [11] have discussed the importance of cloud security and steps to improve the cloud security. In [12] Ramgovind et al. suggested the ways to manage cloud security including : cloud governance, cloud transparency and cloud computing security impacts. In [13] the authors proposed an Effective Privacy Protection Scheme (EPPS) to provide the appropriate privacy protection for cloud services.sudhansu Ranjan Lekha et.al[4] has proposed the hybrid approach of RSA & MDI. In this algorithm the researchers have combined the two technologies for encryption, decryption & hashing. The work that has been already done in the area of data security in cloud is securing the data with the hybrid approach of RSA & MD5. IV. PROPOSED WORK We are combing RSA and SHA1 for the better security. RSA is for the encryption and decryption of the data and SHA1 is for generating hash value. It helps to provide security which only the authorized user can access it. Before storing the data into the cloud, it first encrypts the data. After receiving the request from the client, the CSP authenticates the user and finally decrypts the message and delivers it to the user. In this algorithm we are taking a string and we will generate the public key and private key and encrypt the string using the RSA algorithm and finally generating the hash value of the same message using SHA1. We have opted the manual mechanism as the tool requires highly skilled professionals and it is comparatively expensive. RSA Algorithm The RSA[2,3] algorithm is one of the popular and successful cryptographic algorithm. RSA stands for (RonRivest, Adi Shamir and Len Adleman. RSA is a the process of mapping the message into an integer. RSA includes of Public-Key and Private-Key. The data which is encrypted by Public -Key can be decrypted with the corresponding Private-Key only.

5 Cloud Computing: Security Issues & Solution 1423 It is a three step process[8]: 1. Key Generation 2. Encryption 3. Decryption Steps Key Generation: The first step in the RSA algorithm is key generation. It should be done before the encryption process between the CSP and the user. Steps: 1. Select two random prime numbers x and y. It must be of similar bit length. 2. Compute n = x * y. 3. Calculate m=(x-1)*(y-1). 4.Select a prime number e such that e is co prime number of z and e and is not divisible by m. 5. Publish their public encryption key: KU={e,N} 6.. The private key is e*j=1(mod m). Encryption: Encryption is the process of converting original message (cipher)message. Steps: into scrambled 1. The function of CSP is to prove the public key to all the users who all are storing their data with cloud. 2. The message is now converted into the integer using an agreed reversible protocol called padding scheme. 3. The encryption of the data is done and hence the scrambled (cipher) text is generated C is C = me (mod n). 4. The CSP will then store the cipher text or encrypted text.. Decryption: The conversion of the scrambled data into the original text is known as decryption.

6 1424 Shweta Singh, Tabrez Nafis and Ankita Sethi Steps: 1.The request of the message(data) is generated to the CSP by the user. 2. After verification of the user s authenticity, the cloud service provider sends the encrypted data i.e C. 3. Then the encrypted data is then decrypted by the user by calculating m=cd(mod n) 4. After the retrieval of m, using the reverse padding scheme the original data can be obtained. SHA1: Secure Hash Algorithm SHA1 is a cryptographic[5] algorithm for creating hash function. It generates a 160 bit message digest. A hash algorithm is the algorithm which converts the string of any length into a unique length string. The converted string (output) is comparatively smaller than the input data.. It is generally used to ensure data integrity, passwords authentication and message integrity.one way encryption is the result of a special mathematical function known as hash function.sha-l processes input data in 512-bit blocks. In this process the sender send signed, non secret message to the receiver. In this case the following steps are to be followed: 1. The original message is sent to the SHA1 algorithm in order to get a 160 bit hash value by the sender. 2. The hash value is then signed by the private key of RSA and finally both the original message and the signed hash is then send to the receiver. 3. The receiver calculates the SHA1 hash and applies the public key of sender to the signed hash to obtain the original hash after the retrieval of the message. Hashing Password Original Password Hello Hashed Password Hash Algorithm 9a46ba811185c Hash of the Password Stored Fig 2: Hashing Password

7 Cloud Computing: Security Issues & Solution 1425 Verification of password using hash function Wrong Password World Hash Algorithm Hash Value Mismatched Hash of the Password Stored er4a46b7w a46ba811185c [No] Do Hashes Matched? [Yes] Access Denied Access Granted Fig 3: Verification of Password V. IMPLEMENTATION OF PROPOSED WORK ON CLOUD Now the step by step process of proposed work is as follows:- 1) R.S.A algorithm will generate the key on the cloud side which intern provide the public key of Cloud Service Provider (CSP) to all. 2) Then RSA will generate both the key (public& private) to the client only.the client can only send the public key to the authorized users only. 3) The public key is then sent to the cloud service provider (CSP) with the value of N by the client so that CSP can encrypt the data. 4) With the help of CSP s public key and N s value, the client will encrypt its public key and N s value using RSA algorithm. Post that it will generate the cipher text. 5) The hash value of this cipher text is then generated by using SHA1 by the client. Both the cipher text and hash value is then redirected to CSP. 6) After receiving the message from the client, the CSP will generate the hash value for the same cipher text using SHA1. The CSP then matched both the hash value in order to check the integrity. If the value matches then it is accepted otherwise it is rejected because of the indication of alteration in data. 7) If the data is accepted by the CSP, it uses its own private key and N to decrypt the cipher text for client s key and the value of N using RSA. 8) The user s data is then sent to CSP for storing it in cloud s database. 9) After receiving the data from the client, the CSP, with the help of RSA algorithm uses client public key to encrypt its data and then store the same data after encryption in cloud s database. 10) Whenever the client needs the data, it request CSP for that and to ensure the authenticity of the user, the client uses RSA algorithm to encrypt its request by its own private key and forward it to the CSP. 11) After the proper authentication& authorization of the client by the CSP then

8 1426 Shweta Singh, Tabrez Nafis and Ankita Sethi decrypts the requests with the help of RSA algorithm using client public key. Since the message is encrypted by client private key who is only authorized to use it, and the same message can only be decrypted by the corresponding public key. 12) The CSP will send the data to the client in the encrypted form once it receives the request from the user for accessing the data. 13) The original data is retrieved by the client after decryption of the message using client private key. Fig 4 : Encryption Process Fig 5: Key Generation Using Hashing Fig 6 : Decryption Process

9 Cloud Computing: Security Issues & Solution 1427 VI. EXPERIMENTAL OBSERVATIONS For experiment purpose, we have some taken some sample data( a string) implemented by using the proposed algorithm. and Step 1: Key Generation: We have taken the sample string as My name is Shweta Singh. 1) We have chosen two distinct prime numbers p=23 and q=53. 2) Compute n=p*q, thus n=23*53 = ) Compute Euler s totient function, Ø(n)=(p-1)*(q-1), thus Ø(n)=(23-1)*(53-1) = 22*52 = ) Chose any integer e, such that 1 < e < 1144 that is gcd (e, 1144) =1. Here, we chose e=3. 5) Compute d, d = e-1(mod Ø(n)), thus d=3-1(mod 1144) = 763 6) Thus the Public-Key is (e, n) = (3, 1219) and the Private Key is (d, n) = (763, 1219). This Private-Key is kept secret and it is known only to the user. Step 2: Encryption: The Public-Key (3, 1219) is given by the Cloud service provider to the user who wishes to store the data. 1) Let the message to be send is My name is Shweta Singh which is converted to integer in the following manner: 2) A=0, B=1, a = 27, b=28, c=29 and so on. So the message My name is Shweta Singh is encoded to m= ) Data is encrypted now by the Sender using the corresponding Public-Key which is shared by both the sender and the receiver. 4) C=memod n=c= (mod1219)= ) This encrypted data i.e., cipher text is send to the recipient. Step 3: Decryption: 1) The receiver decrypts the data by computing, m = Cd(mod n) =

10 1428 Shweta Singh, Tabrez Nafis and Ankita Sethi 2) Once the m value is obtained, user will get back the original message using the same encoding technique. Step 4: Generate hash value using SHA1: 1) Using SHA1 on the same string My name is Shweta Singh, the hash value is then generated to convert the string into a unique length string. 2) The hash value of the string My name is Shweta Singh, is BEDF9758AB2D33A4EA1BE25D4F65C12 VII. CONCLUSION Security is the key element to the success of any cloud environment. Since many new attacks can be seen day by day and hence a very strong mechanism is needed to handle all these types of attacks. In this paper, the proposed algorithm which is the hybrid approach of RSA and SHA1 helps to provide new security solutions for these type of attacks. In our proposed work the major factor is data security and with this hybrid algorithm we are trying to meet the objective of data security. REFERENCES [1] Sudhansu Ranjan Lenka, Biswaranjan NayakEnhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm. [2]. Burt Kaliski, The Mathematics of the RSA Public-Key Cryptosystem, RSA Laboratories, February, [3] R.L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Laboratory for Computer Science, Massachusetts Institute of Technology, Cam-bridge, November, [4]. William Stallings, Network Security Essentials Applications and Standards, Third Edition, Pearson Education, [5] Atul Kahate Cryptography and Network Security. [6] Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale Improving Security of Cloud Environment in Dynamic Cloud Network (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, [7] Simarjeet Kaur, Cryptography and Encryption in Cloud Computing, VSRD International Journal of Computer Science and Information Technology, Vol.2(3), , 2012

11 Cloud Computing: Security Issues & Solution 1429 [8] Burt Kaliski, The Mathematics of the RSA Public-Key Cryptosystem, RSA Laboratories, February, [9] Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale Improving Security of Cloud Environment in Dynamic Cloud Network (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, [10] Joachim Schaper, 2010, Cloud Services, 4th IEEE International Conference on DEST, Germany. [11] Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale Improving Security of Cloud Environment in Dynamic Cloud Network (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, [12] Ramgovind S, Eloff MM and Smith E. The Management of Security in Cloud Computing Information Security for South Africa (ISSA), Sandton, Johannesburg, 2-4 Aug, [13] I. Chuang, S. Li, K. Huang, and Y. Kuo, An effective privacy protection scheme for cloud computing, In Proceeding of the 13th International Conference on Advanced Communication Technology (ICACT), 2011 [14] Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1): [15] Hadoop. (n.d.). Retrieved from apache.org [16] Hama. (n.d.). Retrieved from org/labs/cloudsglossary.html

12 1430 Shweta Singh, Tabrez Nafis and Ankita Sethi

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E

More information

Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms

Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms Saba Khanum Department of Information Technology Maharaja Surajmal Institute of Technology, Janakpuri, New Delhi, India Bharti Sharma Department

More information

Public Key Algorithms

Public Key Algorithms Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Chapter 3 Public Key Cryptography

Chapter 3 Public Key Cryptography Cryptography and Network Security Chapter 3 Public Key Cryptography Lectured by Nguyễn Đức Thái Outline Number theory overview Public key cryptography RSA algorithm 2 Prime Numbers A prime number is an

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

International Journal of Scientific Research and Reviews

International Journal of Scientific Research and Reviews Research article Available online www.ijsrr.org ISSN: 2279 0543 International Journal of Scientific Research and Reviews Asymmetric Digital Signature Algorithm Based on Discrete Logarithm Concept with

More information

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,

More information

The Application of Elliptic Curves Cryptography in Embedded Systems

The Application of Elliptic Curves Cryptography in Embedded Systems The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,

More information

Chapter 9. Public Key Cryptography, RSA And Key Management

Chapter 9. Public Key Cryptography, RSA And Key Management Chapter 9 Public Key Cryptography, RSA And Key Management RSA by Rivest, Shamir & Adleman of MIT in 1977 The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on

More information

Overview. Public Key Algorithms I

Overview. Public Key Algorithms I Public Key Algorithms I Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601-04/ Louisiana State

More information

Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing

Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing International Journal of Computer Engineering and Applications, Special Edition www.ijcea.com ISSN 2321-3469 Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing Sonu Kumar

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

Lecture 6: Overview of Public-Key Cryptography and RSA

Lecture 6: Overview of Public-Key Cryptography and RSA 1 Lecture 6: Overview of Public-Key Cryptography and RSA Yuan Xue In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first

More information

ISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I)

ISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I) Outline ISA 662 Internet Security Protocols Some Math Essentials & History Asymmetric signatures and key exchange Asymmetric encryption Symmetric MACs Lecture 2 ISA 662 1 2 Beauty of Mathematics Demonstration

More information

Key Exchange. Secure Software Systems

Key Exchange. Secure Software Systems 1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?

More information

Introduction to Cryptography. Vasil Slavov William Jewell College

Introduction to Cryptography. Vasil Slavov William Jewell College Introduction to Cryptography Vasil Slavov William Jewell College Crypto definitions Cryptography studies how to keep messages secure Cryptanalysis studies how to break ciphertext Cryptology branch of mathematics,

More information

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography

More information

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6033-6037 Integrity Check Mechanism in Cloud Using SHA-512 Algorithm Mrs.Shantala

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Misconceptions Concerning Public-Key Encryption Public-key encryption is more secure from

More information

1.264 Lecture 28. Cryptography: Asymmetric keys

1.264 Lecture 28. Cryptography: Asymmetric keys 1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver

More information

Keywords Security, Cryptanalysis, RSA algorithm, Timing Attack

Keywords Security, Cryptanalysis, RSA algorithm, Timing Attack Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Sanjay Agrawal Department of CEA, National Institute of Technical Teachers Training and Research, Bhopal, India

Sanjay Agrawal Department of CEA, National Institute of Technical Teachers Training and Research, Bhopal, India Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Critical Analysis

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 7 Cryptographic Systems 2012 Cisco and/or its affiliates. All rights reserved. 1 Explain how cryptology consists of cryptography (encoding messages) and

More information

Public Key Encryption. Modified by: Dr. Ramzi Saifan

Public Key Encryption. Modified by: Dr. Ramzi Saifan Public Key Encryption Modified by: Dr. Ramzi Saifan Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime numbers are central to number

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Math From Scratch Lesson 22: The RSA Encryption Algorithm

Math From Scratch Lesson 22: The RSA Encryption Algorithm Math From Scratch Lesson 22: The RSA Encryption Algorithm W. Blaine Dowler January 2, 2012 Contents 1 What Is Encryption? 1 2 What Is RSA Encryption? 2 2.1 Key Generation............................ 2

More information

ASYMMETRIC CRYPTOGRAPHY

ASYMMETRIC CRYPTOGRAPHY ASYMMETRIC CRYPTOGRAPHY CONTENT: 1. Number Theory 2. One Way Function 3. Hash Function 4. Digital Signature 5. RSA (Rivest-Shamir Adleman) References: 1. Applied Cryptography, Bruce Schneier 2. Cryptography

More information

Encryption I. An Introduction

Encryption I. An Introduction Encryption I An Introduction Reading List ADO and SQL Server Security A Simple Guide to Cryptography Protecting Private Data with the Cryptography Namespaces Using MD5 to Encrypt Passwords in a Database

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER 2008-2012 COURSE PLAN Name of the Staff(s) : Mr. M.Raja Name of the Subject / Code : Cryptography and Network / CSE

More information

A Survey on Secure Sharing In Cloud Computing

A Survey on Secure Sharing In Cloud Computing A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing

More information

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional

More information

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION 132 International Journal of Research in Computer Applications And Robotics, x(x): xx-xx INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 BLOWFISH ALGORITHM ON ITS

More information

Secure Cloud-based Access Control Optimization (SCACO)

Secure Cloud-based Access Control Optimization (SCACO) Indian Journal of Science and Technology, Vol 9(37), DOI: 10.17485/ijst/2016/v9i37/102112, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Secure Cloud-based Access Control Optimization

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA

More information

Lecture III : Communication Security Mechanisms

Lecture III : Communication Security Mechanisms Lecture III : Communication Security Mechanisms Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 X.800 : Security

More information

Public-key encipherment concept

Public-key encipherment concept Date: onday, October 21, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on Public Key Cryptography Public-key encipherment concept Each user in a secure communication

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.5 Public Key Algorithms CSC 474/574 Dr. Peng Ning 1 Public Key Algorithms Public key algorithms covered in this class RSA: encryption and digital signature

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Lecture 1 Applied Cryptography (Part 1)

Lecture 1 Applied Cryptography (Part 1) Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication

More information

Public Key Cryptography and the RSA Cryptosystem

Public Key Cryptography and the RSA Cryptosystem Public Key Cryptography and the RSA Cryptosystem Two people, say Alice and Bob, would like to exchange secret messages; however, Eve is eavesdropping: One technique would be to use an encryption technique

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

Proposal for Scrambled Method based on NTRU

Proposal for Scrambled Method based on NTRU Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,

More information

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication K.Arul Jothy, Final Year, Department of Computer Science and Engineering, JCT College

More information

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and

More information

LECTURE 4: Cryptography

LECTURE 4: Cryptography CSC 519 Information Security LECTURE 4: Cryptography Dr. Esam A. Alwagait alwagait@ksu.edu.sa Recap form previous Lecture We discussed more symmetric encryption. Books? Security Engineering, Ross Anderson

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

CS669 Network Security

CS669 Network Security UNIT II PUBLIC KEY ENCRYPTION Uniqueness Number Theory concepts Primality Modular Arithmetic Fermet & Euler Theorem Euclid Algorithm RSA Elliptic Curve Cryptography Diffie Hellman Key Exchange Uniqueness

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network

Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network 31 Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network Sukhvir Kaur 1, Kulwinder Singh 2 1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, India 2

More information

Channel Coding and Cryptography Part II: Introduction to Cryptography

Channel Coding and Cryptography Part II: Introduction to Cryptography Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Giuseppe F. Italiano Universita` di Roma Tor Vergata italiano@disp.uniroma2.it Motivation Until early 70s, cryptography was mostly owned by government and military Symmetric cryptography

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 13 Digital Signatures To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage

More information

Message Authentication Codes and Cryptographic Hash Functions

Message Authentication Codes and Cryptographic Hash Functions Message Authentication Codes and Cryptographic Hash Functions Readings Sections 2.6, 4.3, 5.1, 5.2, 5.4, 5.6, 5.7 1 Secret Key Cryptography: Insecure Channels and Media Confidentiality Using a secret key

More information

Kurose & Ross, Chapters (5 th ed.)

Kurose & Ross, Chapters (5 th ed.) Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and

More information

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems

More information

Lecture 2 Applied Cryptography (Part 2)

Lecture 2 Applied Cryptography (Part 2) Lecture 2 Applied Cryptography (Part 2) Patrick P. C. Lee Tsinghua Summer Course 2010 2-1 Roadmap Number theory Public key cryptography RSA Diffie-Hellman DSA Certificates Tsinghua Summer Course 2010 2-2

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Protection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1

Protection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1 Protection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1 Department of Computer Science, International Islamic University Malaysia,

More information

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4 EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH

More information

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

Keywords Session key, asymmetric, digital signature, cryptosystem, encryption.

Keywords Session key, asymmetric, digital signature, cryptosystem, encryption. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Review of Diffie

More information

Security: Cryptography

Security: Cryptography Security: Cryptography Computer Science and Engineering College of Engineering The Ohio State University Lecture 38 Some High-Level Goals Confidentiality Non-authorized users have limited access Integrity

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015, SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification

More information

Ref:

Ref: Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:

More information

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Belfast, 11-Nov-2010 Innovative Software Solutions. Thomas Bahn - graduated in mathematics, University of Hannover - developing

More information

Project Report. Title: Finding and Implementing Auto Parallelization in RSA Encryption and Decryption Algorithm

Project Report. Title: Finding and Implementing Auto Parallelization in RSA Encryption and Decryption Algorithm Project Report Title: Finding and Implementing Auto Parallelization in RSA Encryption and Decryption Algorithm Satyam Mishra Undergraduate Student, LNM Institute of Information Technology (satyam.mishra@lnmiit.ac.in

More information

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

The Design of an Anonymous and a Fair Novel E-cash System

The Design of an Anonymous and a Fair Novel E-cash System International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of

More information

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography Ashok Kumar J 1, and Gopinath Ganapathy 2 1,2 School of Computer Science, Engineering and Applications

More information

Cryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding

Cryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding Copyright 2000-2001, University of Washington Cryptography is much more than Cryptography Cryptography systems allow 2 parties to communicate securely. The intent is to give privacy, integrity and security

More information

A Proposed Method for Cryptography using Random Key and Rotation of Text

A Proposed Method for Cryptography using Random Key and Rotation of Text Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf

More information

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Vol 1, Issue 2, April 2013 Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Krishnappa H K 1, N K Srinath 2 and S Manjunath 3 Assistant Professor, Dept of

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

NETWORK SECURITY & CRYPTOGRAPHY

NETWORK SECURITY & CRYPTOGRAPHY Assignment for IT Applications in Management Project On NETWORK SECURITY & CRYPTOGRAPHY Course Instructor Submitted By: Mr. ANIL KUMAR ROHIT BARVE 2013240 Section E PGDM 2013-15 Table of Contents Chapter

More information

Enhanced ECC algorithm over Public Key Cryptography

Enhanced ECC algorithm over Public Key Cryptography Enhanced ECC algorithm over Public Key Cryptography 1 2 Miss PrastavanaP P, Mrs. Suraiya PraveenP 1. Student of Jamia Hamdard University, Delhi 2. Assistant Professor in Computer Science Department Abstract

More information

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

ח'/סיון/תשע א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

Viability of Cryptography FINAL PROJECT

Viability of Cryptography FINAL PROJECT Viability of Cryptography FINAL PROJECT Name: Student Number: 0151677 Course Name: SFWR ENG 4C03 Date: April 5, 2005 Submitted To: Kartik Krishnan Overview: The simplest definition of cryptography is The

More information

Some Stuff About Crypto

Some Stuff About Crypto Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative

More information

Delineation of Trivial PGP Security

Delineation of Trivial PGP Security IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 20, Issue 3, Ver. I (May. - June. 2018), PP 17-23 www.iosrjournals.org Delineation of Trivial PGP Security Mr.

More information

Public Key Algorithms

Public Key Algorithms Public Key Algorithms CS 472 Spring 13 Lecture 6 Mohammad Almalag 2/19/2013 Public Key Algorithms - Introduction Public key algorithms are a motley crew, how? All hash algorithms do the same thing: Take

More information

COMP4109 : Applied Cryptography

COMP4109 : Applied Cryptography COMP4109 : Applied Cryptography Fall 2013 M. Jason Hinek Carleton University Applied Cryptography Day 2 information security cryptographic primitives unkeyed primitives NSA... one-way functions hash functions

More information

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a

More information